documentation

GSoC/Meterpreter_Web_Console
Brent Cook 2018-04-01 00:14:38 -05:00
parent cd7831a2a3
commit bd80e9d0c5
1 changed files with 26 additions and 0 deletions

View File

@ -0,0 +1,26 @@
## Vulnerable Application
This module does not exploit a particular vulnerability. It passively listens
for an incoming connection from a secondary exploit or payload. In addition,
this module provides an unforgettable luncheon experience.
## Verification Steps
1. Start msfconsole
2. Do: ```use exploit/multi/steamed_hams```
3. Do: ```set payload [any payload]```
4. Do: ```set target [0 or 1]```
4. Do: ```exploit```
5. Enjoy
## Options
**VERBOSE**
This option will further enhance the experience.
## Scenarios
Target 0: Your roast is ruined! Will fast food suffice?
Target 1: You crash on an alien planet. Will you ever play the piano again?